<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN over Multiple ISP connections in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-over-multiple-isp-connections/m-p/588481#M3244</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am new to the PA world and I have the following design been given to setup. I am trying to find the best way to do this. I have done in Fortinet by creating SDWAN interface and it worked but not sure if Palo has the same kind of setup. If someone help me that would be great.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site Firewall -- 1.100 and 1.200 ( sub interfaces ) -- ( Trunk Vlan 100, 200 ) L2 SWITCH ( Port 10 - V100 - ISP 1, Internet) , ( Port 20 - V200 - ISP2 , Internet) -- ( DC , PA , VPN over internet Internet )&amp;nbsp; -- Rest of the network&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to make sure, as long as I have internet connection , either via ISP1 or ISP2, My tunnel stays up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One of the solution I can think of is using the default route via ISP1 setup a tracking and use the second&amp;nbsp; default route via ISP2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use virtual interface ( Public IP) on the Site firewall to create the tunnel source to the Destination.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the Public IP is not available then use the interface IP and stand up two tunnels from each of the ISP and then use BGP to navigate the routing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not sure if there is any other smart way to do this. I used to combined this two connection to One virtual interface in fortinet and use that interface to create the tunnel so regardless which ISP is active tunnel and routing always find a way.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help me with some guidance.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 09:47:14 GMT</pubDate>
    <dc:creator>gondolf</dc:creator>
    <dc:date>2024-05-31T09:47:14Z</dc:date>
    <item>
      <title>VPN over Multiple ISP connections</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-over-multiple-isp-connections/m-p/588481#M3244</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am new to the PA world and I have the following design been given to setup. I am trying to find the best way to do this. I have done in Fortinet by creating SDWAN interface and it worked but not sure if Palo has the same kind of setup. If someone help me that would be great.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site Firewall -- 1.100 and 1.200 ( sub interfaces ) -- ( Trunk Vlan 100, 200 ) L2 SWITCH ( Port 10 - V100 - ISP 1, Internet) , ( Port 20 - V200 - ISP2 , Internet) -- ( DC , PA , VPN over internet Internet )&amp;nbsp; -- Rest of the network&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to make sure, as long as I have internet connection , either via ISP1 or ISP2, My tunnel stays up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One of the solution I can think of is using the default route via ISP1 setup a tracking and use the second&amp;nbsp; default route via ISP2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use virtual interface ( Public IP) on the Site firewall to create the tunnel source to the Destination.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the Public IP is not available then use the interface IP and stand up two tunnels from each of the ISP and then use BGP to navigate the routing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not sure if there is any other smart way to do this. I used to combined this two connection to One virtual interface in fortinet and use that interface to create the tunnel so regardless which ISP is active tunnel and routing always find a way.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help me with some guidance.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 09:47:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-over-multiple-isp-connections/m-p/588481#M3244</guid>
      <dc:creator>gondolf</dc:creator>
      <dc:date>2024-05-31T09:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN over Multiple ISP connections</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-over-multiple-isp-connections/m-p/588749#M3267</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;There are several ways to accomplish this. Obviously build the two tunnels, then you have routing options:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Policy Based Forwarding - Setup a policy to send all traffic via the preferred tunnel and set a monitor, disable this rule..., and Enforce Symmetric return. Choose an IP address on the other side of the tunnel that should be up, ie the internal management interface of the other vpn endpoint etc. Then a static route pointing at the secondary tunnel. PBF takes effect before the virtual router.&lt;/LI&gt;
&lt;LI&gt;Static routing - setup static routes with metrics and path monitoring. Leave the primary route with the default metric and set the secondary with something high like 10000. then you have to do the same on the other vpn endpoint.&lt;/LI&gt;
&lt;LI&gt;Dynamic routing - This is what I usually setup with OSPF, same as static routing.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Hope this makes sense, please feel to ask additional questions etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 16:47:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-over-multiple-isp-connections/m-p/588749#M3267</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-06-04T16:47:36Z</dc:date>
    </item>
  </channel>
</rss>

